In the Linux kernel, the following vulnerability has been resolved: crypto: qat/qat_4xxx - fix off by one in uof_get_name() The fw_objs[] array has "num_objs" elements so the > needs to be >= to prevent an out of bounds read.
https://git.kernel.org/stable/c/e69d2845aaa080960f38761f78fd25aa856620c6
https://git.kernel.org/stable/c/700852528fc5295897d6089eea0656d67f9b9d88
https://git.kernel.org/stable/c/475b5098043eef6e72751aadeab687992a5b63d1
https://git.kernel.org/stable/c/05c9a7a5344425860202a8f3efea4d8ed2d10edb